
Note – A big shoutout to Rohan Kar, one of our security researchers at Seconize, for identifying a critical flaw in the IRCTC platform
In June 2025, while booking a train ticket via the official IRCTC platform, I came across a critical security flaw affecting users who opt for travel insurance through United India Insurance Company (UIIC). This IRCTC vulnerability, an Insecure Direct Object Reference (IDOR), could allow unauthorized access to insurance certificates of other passengers.
This article documents the full discovery process, technical proof of concept, and the impact of the vulnerability — responsibly reported to CERT-In and relevant stakeholders.
https://example.in/IrctcRestService/IrctcPaCert?pnrNo=MTc1MzI3NzEyMg==
The pnrNo
parameter is a Base64-encoded PNR number.
Example:
GET /IrctcRestService/IrctcPaCert?pnrNo=MTc1MzI3NzEyMg== # Decodes to: 1753277122
By altering this Base64 value, I could access the insurance certificate of any valid PNR number without any form of authentication or authorization.
Guess I’m the insurance agent now. 😎
https://example.in/IrctcRestService/IrctcPaCert?pnrNo=<Base64EncodedPNR>
pnrNo
parameter to another valid encoded PNR (e.g., MTc1MzI3NzEyMg==), the API returns another user’s insurance certificate.curl
:curl "https://example.in/IrctcRestService/IrctcPaCert?pnrNo=MTc1MzI3NzEyMg=="
⚠️ Note: Testing was strictly limited to self-booked PNRs to avoid violating user privacy or legal boundaries.
💡 In a test environment, I created a Python POC to automate requests. With minimal effort, it was possible to access certificate data for 50+ valid PNRs, highlighting the potential scale of abuse.
End of June 2025 IRCTC Vulnerability discovered during booking flow
Early July 2025. Reported to CERT-In and IRCTC
The vulnerability was silently fixed in mid-June 2025.
After responsible disclosure, the affected endpoint no longer allows unauthorized access to insurance documents. As part of the fix, the “Download Certificate” option has been removed from the user interface after nominee submission.
Below is a comparison of the interface:
This discovery highlights how seemingly minor flaws — like missing authentication on a third-party API — can lead to major privacy risks. I appreciate that the issue was resolved quickly, but a formal acknowledgment or bug bounty program would go a long way in building a security-first culture.
Stay secure. Hack responsibly. 🔐
Recent Comments